Him, an adventurer, CISO, soldier, Marine, law officer, author, professor, spy, yachty, motorcyclist, photographer. Her, was the church lady librarian, got divorced, joined a motorcycle gang, became a hacker, and world adventurer.

Main menu

Category: Rant

This is more from my noisy search for my next windmill to tilt at in what will be the great success of helping an organization become more resilient, capable, and respected for the information security posture they exhibit. I like…

We spend a lot of time talking about leadership where we think of it as getting people to do something through some form of incentive or disincentive. Simply churning and burning our way to action through carrots and sticks though…

After reading the first third of “Disrupted; My Misadventure in the startup bubble” by Dan Lyons I realized that I had been marketing myself all wrong. Hiring managers like the little-emperors of China want happy, go-lucky, youthful, soft individuals to…

I am not rich or famous and most assuredly I am very average in intellect and capability. I have an on again and off again relationship with social media and networking. I am not what you would call a social…

When Mandiant came out with the APT1 report the world was shattered into two camps. In the first camp was a group of people who were happy to have more information on the bad guys entering their networks and doing…

Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana “James B. Comey said Monday that if the FBI hopes to continue to keep pace with cyber criminals, the organization may have to loosen up its no-tolerance policy for hiring those who…

I see a lot of discussion at hacker cons or security cons depending on your predilection that says something to the effect “I’m burned out and drink to much.” The information security community has a hidden underbelly that hangs over…

Over at NovaSec @grecs has a post titled Cyber Security versus Information Security. He acknowledges that there are some problems in the lack of definitions. This has been a long time (eight decades) discussion in the field. First I have to admit that…

The fallacy I read on a daily basis about cyberspace being a man made domain just peeves me off. What the assertion that cyberspace is the first man made domain is actually doing is mixing up the tools of exploitation…

I did away with another social media service. Buh bye LinkedIn. Why? In the what is becoming an old adage, if you aren’t paying for the product you are the product, I couldn’t figure out what LinkedIn was giving me.…

Lots of discussion in the mainstream press about every fortune 500 being hacked, the <insert name> government has hacked us into smithereens. The world is ending. We need to do <insert favorite vendor solution> to save the world. Bull pucky.…

On my two hour run today I was thinking about information security and the research vectors that I see within the discipline. I don’t publish very much so I have little effect on the space. I was thinking about how…

RSS Links

Cyber?

Cyber security and the technologies of securing the information enterprise of industry and government require a trans-disciplinary while still STEM focused research agenda. The term “cyber” itself denotes a human cognitive centric concept that deals with the disintermediation of technology centered within human activity. The changing focus from system threat mitigation to enterprise risk management has opened completely new areas of inquiry into security.